{"id":504,"date":"2024-02-27T16:05:01","date_gmt":"2024-02-27T15:05:01","guid":{"rendered":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/?page_id=504"},"modified":"2024-06-23T14:32:33","modified_gmt":"2024-06-23T13:32:33","slug":"post-quantum-cryptography","status":"publish","type":"page","link":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/cours\/post-quantum-cryptography\/","title":{"rendered":"Post-quantum cryptography"},"content":{"rendered":"\n<p>Teachers: Alice Pellet-Mary and Gilles Z\u00e9mor.<\/p>\n\n\n\n<p><strong>Program:<\/strong><\/p>\n\n\n\n<p>Classical public-key cryptography is known to be vulnerable to quantum computers, and post-quantum cryptography is the answer to this threat. In this course, we will study two aspects of post-quantum cryptography: code-based cryptography and lattice-based cryptography. Half the course will be devoted to code-based crypto and the other half will be devoted to lattice-based crypto (the two parts may be interleaved). No prior study of cryptography will be assumed, though we would encourage prospective students to aquire some exposure to the concept of&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography\">public-key cryptography<\/a>.<\/p>\n\n\n\n<p>The code part will be organized as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>definition of a linear code and some properties<\/li>\n\n\n\n<li>algorithms for decoding a code<\/li>\n\n\n\n<li>construction of public key encryption from codes (McEliece cryptosystem and Alekhnovich cryptosystems)<\/li>\n<\/ul>\n\n\n\n<p>The lattice part will be organized as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>definition of a lattice and some properties<\/li>\n\n\n\n<li>algorithms for reducing the basis of a lattice<\/li>\n\n\n\n<li>construction of hash functions and public key encryption from lattices (Atjai hash function, Regev encryption scheme)<\/li>\n<\/ul>\n\n\n\n<p>The lectures will be illustrated by exercise sessions and programming sessions using SAGE.<\/p>\n\n\n\n<p><strong>Prerequisites:<\/strong><\/p>\n\n\n\n<p>Linear algebra.<\/p>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>M. Sudan,\u00a0<em><a href=\"https:\/\/madhu.seas.harvard.edu\/MIT\/coding\/course.html\">Course Notes on Coding Theory<\/a><\/em><\/li>\n\n\n\n<li>G. Zemor.\u00a0<em><a href=\"http:\/\/www.math.u-bordeaux.fr\/~zemor\/alekhnovich.pdf\">Notes on Code-based Cryptography<\/a><\/em><\/li>\n\n\n\n<li>D. Micciancio and S. Goldwasser.\u00a0<em>Complexity of lattice problems: a cryptographic perspective.<\/em>\u00a0Springer Science &amp; Business Media, 2002<\/li>\n\n\n\n<li>C. Peikert.\u00a0<em>A Decade of Lattice Cryptography<\/em>,\u00a0<a href=\"https:\/\/eprint.iacr.org\/2015\/939.pdf\">available here<\/a><\/li>\n\n\n\n<li>D. Dadush and L. Ducas.\u00a0<a href=\"https:\/\/homepages.cwi.nl\/~dadush\/teaching\/lattices-2018\/\">Lecture notes<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Teachers: Alice Pellet-Mary and Gilles Z\u00e9mor. Program: Classical public-key cryptography is known to be vulnerable to quantum computers, and post-quantum cryptography is the answer to this threat. In this course, we will study two aspects of post-quantum cryptography: code-based cryptography and lattice-based cryptography. Half the course will be devoted to code-based crypto and the other &hellip; <a href=\"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/cours\/post-quantum-cryptography\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Post-quantum cryptography&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-504","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/pages\/504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/comments?post=504"}],"version-history":[{"count":3,"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/pages\/504\/revisions"}],"predecessor-version":[{"id":508,"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/pages\/504\/revisions\/508"}],"up":[{"embeddable":true,"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/pages\/4"}],"wp:attachment":[{"href":"https:\/\/uf-mi.u-bordeaux.fr\/algant\/index.php\/wp-json\/wp\/v2\/media?parent=504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}